Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2013 | Article Id. IJCOT-V3I4P9 | DOI : https://doi.org/10.14445/22492593/IJCOT-V3I4P9
Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium
Ambarisha Malladi , M. Chandra Naik, Sayyed Nagul Meera
Citation :
Ambarisha Malladi , M. Chandra Naik, Sayyed Nagul Meera, "Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium," International Journal of Computer & Organization Trends (IJCOT), vol. 3, no. 2, pp. 32-39, 2013. Crossref, https://doi.org/10.14445/22492593/ IJCOT-V3I4P9
Abstract
In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks, presenting a challenger model for selective jamming attacks, which may give to the high importance for packet Delivery Techniques in which specific messages of “high importance” are targeted. Further, we illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We examined the combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. We develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. Here we propose the Packet delivery techniques on Jamming Attacks over a wire less medium. In this paper we use hiding mechanisms and cryptographic techniques based on the Riddles.
Keywords
Jamming Attacks, Wireless Networks Elements, Crypto–logic Riddles, Enhanced Packet Delivery Techniques, wi-fi, Blue Tooth.
References
[1].Alejandro Proa˜no and Loukas Lazos- Packet-Hiding Methods for Preventing Selective Jamming Attacks.
[2]. G. Noubir and G. Lin. Low-power DoS attacks in data wireless LANs and bad guys. In DIMACS Workshop on Mobile and Wireless Security, 2004.
[3]. www.techterms.com/definition/wireless
[4]. http://www.geocaching.com/seek/cache_details.aspx?guid=395a56a3-61b4-4c29-b413-69374d4c2565
[5]. Y.Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2):2–23, 2006.
[6]. J. Douceur. The sybil attack. In 1st International Workshop on Peer-to-Peer Systems - IPTPS,2002.
[7]. Andrew S. Tanembaum. Redes de computadores. Elsevier, Rio de Janeiro, 4ž edition edition,2003.
[8]. www.spamlaws.com/jamming-attacks.html
[9]. www.cambridge.org/us/catalogue/
[10]. Gustavo S. Quirino, Admilson R. L. Ribeiro and Edward David Moreno- Asymmetric Encryption in WirelessSensor Networks